Skip to content
New issue

Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? # to your account

Path validation fix #10

Merged
1 commit merged into from
Mar 15, 2011
Merged

Path validation fix #10

1 commit merged into from
Mar 15, 2011

Conversation

jsiwek
Copy link
Contributor

@jsiwek jsiwek commented Feb 23, 2011

Please consider pulling this change. It fixes a problem where, during certificate path validation, the signature of a certificate is not verified against a trusted certificate. Note that it's still not checked whether the trusted certificate is a self-signed CA cert. (it breaks the path validation test suite), so I made a note of that in the comments.

Otherwise, this change passes the tests for me (except for SSLConfiguratorTest and TomcatTest/ClientTest, which were breaking for me even before the changes), and it looks like it's working with the GSI-SSHTerm java client when connecting to real TeraGrid SSH servers as well as my own test one.

I have a more isolated test case that I've uploaded here:

https://github.com/jsiwek/JGlobusPathValidationTest

That could probably be turned into a test case in ProxyPathValidatorTest.

- In the case that a CA trust root was not already a part of the CertPath
  given to TrustedCertPathFinder.findTrustedPath(), the signature of
  last certificate in the chain is now verified against the discovered
  trust root certificate.

- When checking that the next certificate in the chain has a subject DN
  that matches the last's certificate's DN, normalize the DNs to a
  common, Globus format.
This pull request was closed.
# for free to join this conversation on GitHub. Already have an account? # to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant